Anonymous Online: The Ultimate Guide to Online Privacy
4.0 (23 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
124 students enrolled
Wishlisted Wishlist

Please confirm that you want to add Anonymous Online: The Ultimate Guide to Online Privacy to your Wishlist.

Add to Wishlist

Anonymous Online: The Ultimate Guide to Online Privacy

Learn how to stop websites from tracking you, use TOR and VPNs, encrypt your chats and calls & send emails anonymously
4.0 (23 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
124 students enrolled
Created by Shashank Sharma
Last updated 11/2015
Current price: $10 Original price: $20 Discount: 50% off
5 hours left at this price!
30-Day Money-Back Guarantee
  • 1.5 hours on-demand video
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
What Will I Learn?
  • Stop websites from tracking you
  • Access blocked websites
  • Stop your computer and web browser from leaking your personal information
  • Use TOR to mask your identity online
  • Use VPNs for faster, safer online experience
  • Choose which country you want your online traffic to originate from
  • Send emails anonymously
  • Stop companies from selling your email address to spammers and cluttering up your inbox
  • Use virtual machines to deal with suspicious files without harming your computer
  • Encrypt your online chats so that eavesdroppers can't read them
  • Use services that encrypt your phone calls and text messages
  • Make it harder for hackers to compromise your system
  • Learn about an Operating System that is built with security and anonymity in mind
View Curriculum
  • How to use a PC/Mac
  • How to install softwares
  • How to browse the internet

Every day, advertising companies track our every move and bombard us with "relevant" advertisements at the expense of our privacy, ISPs and government entities in some countries stop us from visiting social networking sites and other harmless sites that don't conform to their ideology by censoring online content and hackers try to steal our data and hack our accounts for their own gain or just for the lulz.

Packed with step-by-step tutorials, screencasts and presentations, this course will teach how to stay anonymous online, how to deter private and public entities from gathering data on you and how to safeguard your online privacy against hackers; without learning to code or acquiring a computer science degree in the process!

This course will empower you and make you feel safer online.

In this course, you will learn:

  • How private and public entities identify you online and how they store data on you to create a usage profile.
  • How your computer and web browser is leaking tons of personal information about you and what you can do to stop that
  • What proxy service and virtual private networks (VPNs) are and how to use them
  • How to install and use anonymising software and services to safeguard your online identity
  • How to view website that have been censored by your ISP or government
  • What is virtual machine and how you can use it to deal with suspicious file that could cause harm to your computer
  • How to send anonymous emails and more importantly not let companies use your email IDs to create your profile or sell your address to spammers
  • How to encrypt your online chats so no eavesdropper can read it
  • What services allow you to encrypt your phone calls and text messages and ensure the safety of the one device you cannot live without: your smartphone.
  • Bonus Content: Overview of an entire Operating System built around anonymity and online security.

Who is the target audience?
  • Anybody who is bothered about the amount of information being gathered on them on a day-to-day basis by private and public entities
  • Anybody who is living in a region with unnecessary online censorship
  • Anybody who wants to be safer online
  • No programming knowledge required
Compare to Other Online Security Courses
Curriculum For This Course
18 Lectures
1 Lecture 02:07

This is the introductory lecture of the course that discusses who this course is for and the contents of this course

Preview 02:07
How your computer is recognised online
2 Lectures 06:57

This lecture will talk about what an IP address is, the difference between a private and public IP address, how to find your public IP address and what it reveals about you.

Preview 02:58

This lecture discusses what Domain Name Service (DNS) is and how it leads to revelation of your physical location and Internet Service Provider (ISP). We will also learn how to check for DNS leaks from your browser.

Preview 03:59
Your Gateway to the Internet - The Browser
5 Lectures 22:13

This lecture will demonstrate what sort of personal and private information your web browser is leaking and how you can do browser information leak tests online.

What information is your browser leaking

Here, we will modify the settings of our browser to safeguard our online privacy and make it tougher for companies and websites to glean information about us

browser settings and your online privacy

Despite changing all the right settings and securing our browser, we will still require some browser extensions to improve the functionality of our browser and make it more secure against online advertisers and malicious websites. In this lecture, we will talk about a browser extension that can be used to stop all website scripts from running on your browser

Browser extension to block scripts from running on websites

In this lecture we will download and install a browser extension that shows you exactly what trackers reside in each website that you visit, their purpose and the provision to block them from tracking you

Browser extension to stop websites from tracking you

Here we will install a browser extension that enables SSL encryption for all websites that support them. This will encrypt all the data travelling to and from the website to your computer

Preview 02:40
Softwares to hide your identity
4 Lectures 26:52

Our first anonymising software suite. We will discuss The Onion Router (TOR), the basics of how it works, the type of people that use it, what it accomplishes as well as the disadvantages and limitations of using TOR

What is TOR and how does it work

This lecture will demonstrate how to correctly install and use TOR to hide your public IP address and mask your identity on the World Wide Web.

How to install and use TOR

Here we will be discussing what a Virtual Private Network (VPN) is, how it works and what it achieves along with the difference between VPN and TOR.

What are VPNs and how do they work

This tutorial will show how to install and run a particular VPN service and how to test whether it is correctly working or not.

How to install and use a VPN
How to deal with suspicious files
1 Lecture 04:12

In this lecture we will discuss what a virtual machine (VM) is, how to use VM softwares to run operating systems in a virtual environment and deal with suspicious files. This is to make sure that no malicious file can compromise our system

Virtual Machines and how they can help you
Encrypted Communication
3 Lectures 13:50

In this lecture we will talk about how to create a near anonymous email ID using a conventional email service provider and how to safeguard our inbox against spams by using special email services for various online accounts

How to send emails anonymously and how to save yourself from spam emails

In this lecture, we will learn to encrypt our Instant Messaging (IM) chats so that network sniffers and people eavesdropping on our network cannot read our chat

How to encrypt your IM chat

In this lecture we discuss a firm that provides softwares and services to encrypt our phone calls, video chat, messages and provide all-round protection to our smartphone communications.

Service to encrypt your smartphone - Encrypt calls and messages
Bonus Content
1 Lecture 05:11

Here is a bonus lecture that discusses an Operating System built from the ground up with security and anonymity in mind. This OS gained popularity after the famous whistleblower Edward Snowden lauded it for its security.

Edward Snowden's Operating System of choice
Conclusion & Recap
1 Lecture 08:06

Congratulation on completing this course. Here is a quick recap of everything that we learnt. Hope you enjoyed this course and learnt something useful. Thank you.

Conclusion and recap of the course
About the Instructor
Shashank Sharma
4.0 Average rating
23 Reviews
124 Students
1 Course
Engineer, MBA, Teacher, Consultant

Possessing a varied background, having dabbled in computer programming and web designing, along with professional work experience in MEP project (controls and automation) as well as management consulting, Shashank is always keen on learning and teaching new skills that can be used to improve productivity, quality of life and add a little oomph to the resume.

Shashank has previously taught SAT II students and mentored Engineering Diploma students.

Shashank has a degree in engineering from the UK, is a recent graduate from a global top 10 B-School (Financial Times ranking, 2015) and is a voracious tech junkie.